Sciweavers

908 search results - page 122 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
WIMOB
2008
IEEE
15 years 6 months ago
Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs
—Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer ...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 12 months ago
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
WIOPT
2005
IEEE
15 years 5 months ago
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
Using decentralized reputation systems is a promising approach to ensuring cooperation and fairness in Mobile Ad-Hoc Networks. However, they are vulnerable to liars and robustness...
Jochen Mundinger, Jean-Yves Le Boudec
ADHOC
2007
108views more  ADHOC 2007»
14 years 12 months ago
A self-healing On-demand Geographic Path Routing Protocol for mobile ad-hoc networks
We present a self-healing On-demand Geographic Path Routing Protocol (OGPR) for mobile ad-hoc networks. OGPR is an efficient, stateless, and scalable routing protocol that inherit...
Venkata C. Giruka, Mukesh Singhal
108
Voted
APNOMS
2006
Springer
15 years 3 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...